So you might have heard the buzzwords “2FA” or “Multi-factor Authentication” thrown around a lot lately. The use of 2FA has become increasingly popular over the last few years. Apple has started prompting their users to activate this more advanced form of security. Your child’s Xbox Live account is now also prompting them to activate and use 2FA. Software you use at work, particularly credit card processing software, may also require card access or a 6 digit code. So that begs the question: what is multi-factor authentication?
It’s easy to assume and feel confident that Microsoft Office 365 is reliable and leave it at that, but we wouldn’t be doing our jobs if we didn’t tell just how reliable it is.
Here are 3 simple reasons why you can feel confident in choosing Office 365 as your platform:
Microsoft Office 365 is a cloud-based subscription model that offers email and office productivity solutions that many are finding attractive. Business applications from Outlook to Excel is accessible anywhere you have an internet connection on multiple devices, depending on the plan you pick. Traditional Microsoft Office applications were only utilized through desktop installations, limiting access to your productivity environment.
UniVista offers three of the most popular licenses within O365, Business Essentials, Business Premium and Enterprise E3.
The beginning of a new year is a good time to review the hot topics for 2019. To cloud, or not to cloud? What’s to be gained by moving to cloud platforms, such as Microsoft’s Office 365? Let’s review…
2019 is here, and it is a special year for all concerned due to many Microsoft products going End of Life (EOL) in January of 2020. We’ve covered the whys of EOL in previous pings, so in this edition we would like to remind you of the importance of keeping your servers updated and workstations rebooted when prompted. We discussed this necessity in The Ping: Updates and Upgrades, and we encourage you to review it. Staying ahead of the game will help prevent down time from malware and slow systems or hardware crashes. This edition of “The Ping!” should answer any lingering questions about Microsoft’s EOL policy and dates.
As the year draws to a close, we want to remind you of how important it is to stay diligent with your cybersecurity awareness training and security updates. This year, like years past, cybersecurity breaches have topped headline news and may have affected you personally. Let’s review some of the larger breaches and malware risks this year. These are security breaches that allowed someone or some group to access personal information, and they could even access some examples of how that information was used.
Criminal Justice Information Services (CJIS)
Criminal Justice Information Services, or CJIS, is a division of the FBI that provides criminal justice information needed to perform law enforcement duties. It “serve[s] as the focal point and central repository for criminal justice information services in the FBI.” – FBI. In Texas this information is disseminated via the DPS and includes details such as vehicle registration, criminal history, driver’s license, license plate, firearm, etc. Because this information is highly sensitive and needs to be protected, CJIS provides security compliance requirements and performs audits to ensure these requirements are being met. Below are just a few example requirements of the Security Policy…
- Security Awareness Training
- Perimeter Intrusion Detection
- Advanced Authentication
- Maintain Log History
- Change Management
- Device Encryption
Failing a single audit flags an agency as non-compliant. If compliance is not achieved, the agency can lose access to the information and tools needed to perform their duties.
What is compliance? Some of you might be acutely aware of this term, and others might have little to no idea. In broad terms, business compliance means following the rules required to secure your business and the people that interact with it. More specifically, compliance is aimed at information security. Business Compliance means you are complying with requirements by a credible organization or government department that promotes the security and protection of sensitive information.
Cybersecurity starts first, and foremost, with people. Even with a secure perimeter, the people using the network can introduce risks to the environment. Teaching your employees what to look out for and where their responsibilities lie are the first steps to closing the security gaps and lessen the chances of your business falling victim to a vicious attack.